The Indian restaurant rating website Burrp was one of the recent targets for ransomware. With such incidents predicted to see a surge, experts put forth strategies to defend against ransomware and share lessons on how to minimize risks.
Tools and techniques need to be identified to aid law enforcement in gathering evidence from devices, such as smartphones, while safeguarding the security and privacy of individuals. Can stakeholders find that middle ground?
A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?
Security leaders discuss the cyber-threat challenges facing India's critical infrastructure, including energy, manufacturing, defense and transportation. What new strategies, solutions and best practices do they suggest to respond to emerging threats?
Experts say the cyber world is becoming more complex with growth in interconnected devices, and emphasize the need to build a resilient cyber defense that can help resist and respond to emerging threats. There is a need to re-think their approach to security.
Despite the recent move to put the FBI-obtained court order against Apple on hold, the crypto debate is far from over, said a panel of law enforcement, legal and industry experts at Information Security Media Group's Fraud and Breach Prevention Summit in San Francisco.
Neither the FBI nor Apple looks good in the days following the postponement of a hearing on whether Apple should be forced to help the bureau crack open the iPhone of one of the San Bernardino shooters. The FBI's credibility is being questioned as Apple's security technology is being tarnished.
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
IDRBT Director Dr. Ramasastri says enterprises find managing data breaches increasingly difficult. Assembling pieces of the puzzle - technology, solutions, skills, compliance and security - needs an effective governance structure.
The PCI Security Standards Council envisions a single, globally-unified data security standard. Now that the European Card Payment Association is a strategic regional member, that goal is significantly closer, says Jeremy King, the council's international director.
Vikrant Varshney of Risk Resources believes cyber threats are a concern of every individual, every organization who thought IT is just a system. A collaborative approach in building awareness is acute to fight this cyberwar, he says.
The Department of Justice has been granted a delay of a March 22 hearing relating to a court order compelling Apple to help the FBI unlock the iPhone 5C issued to San Bernardino shooter Syed Rizwan Farook. That's because it says it may have found a way to unlock the phone without Apple's assistance.
Non-jailbroken iOS devices can be hacked by exploiting Apple's digital rights management feature called FairPlay, according to security experts, who say the vulnerability poses a risk to enterprises.
Fraudsters unsuccessfully attempted to steal $80,000 (U.S.) from Indian e-commerce company Flipkart through an email spoofing scheme targeting the CFO, who thwarted the crime.
In the world of the extended enterprise, everybody seeks greater visibility into network activity. But Gidi Cohen was there in 2002, founding Skybox Security to provide analytics to improve cybersecurity. Cohen discusses the evolution of visibility.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.